ENCRYPTED MESSAGE COMMUNICATION
First Claim
1. A computer-implemented method for communicating message data from a sender computer to a receiver computer via a network, the method comprising, at the sender computer:
- encrypting the message data in dependence on a cryptographic key to produce a ciphertext;
establishing an access password for the ciphertext with a host computer connected to the network;
sending the ciphertext via the network to the host computer for storage in association with the access password by the host computer; and
sending an email, containing said cryptographic key in cleartext, to the receiver computer via the network;
wherein the cryptographic key comprises a random cryptographic value which is independent of the access password.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer-implemented methods are provided for communicating message data from a sender computer to a receiver computer via a network. The sender computer encrypts the message data in dependence on a cryptographic key to produce a ciphertext, and establishes an access password for the ciphertext with a host computer connected to the network. The sender computer sends the ciphertext via the network to the host computer, and sends an email, containing the cryptographic key in cleartext, to the receiver computer via the network. The cryptographic key comprises a random cryptographic value which is independent of the access password. The host computer receives the ciphertext from the sender computer and stores the ciphertext in association with the access password. The receiver computer receives the email from the sender computer and sends an access request for the ciphertext, and an input password, to the host computer via the network. The host computer, on receiving the access request and the input password, sends the ciphertext to the receiver computer via the network if the input password equals the access password. The receiver computer decrypts the received ciphertext using the cryptographic key to obtain the message data.
-
Citations
23 Claims
-
1. A computer-implemented method for communicating message data from a sender computer to a receiver computer via a network, the method comprising, at the sender computer:
-
encrypting the message data in dependence on a cryptographic key to produce a ciphertext; establishing an access password for the ciphertext with a host computer connected to the network; sending the ciphertext via the network to the host computer for storage in association with the access password by the host computer; and sending an email, containing said cryptographic key in cleartext, to the receiver computer via the network; wherein the cryptographic key comprises a random cryptographic value which is independent of the access password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for communicating message data between a sender computer and a receiver computer via a network, the method comprising, at a host computer connected to the network:
-
receiving a ciphertext, encrypting the message data, from the sender computer via the network; establishing an access password for the ciphertext with the sender computer; storing the ciphertext in association with the access password; receiving an access request for the ciphertext, and an input password, from the receiver computer via the network; and sending the ciphertext via the network to the receiver computer if the input password equals the access password. - View Dependent Claims (11, 12, 13)
-
-
14. A computer-implemented method for receiving message data from a sender computer via a network, wherein the message data is encrypted, in dependence on a cryptographic key, in a ciphertext produced by the sender computer and the ciphertext is stored by a host computer connected to the network in association with an access password, the method comprising, at a receiver computer connected to the network:
-
receiving an email, containing said cryptographic key in cleartext, from the sender computer via the network; sending an access request for the ciphertext, and the access password, to the host computer via the network; receiving the ciphertext from the host computer via the network; and decrypting the ciphertext using said cryptographic key to obtain said message data. - View Dependent Claims (15, 16, 17)
-
-
18. A computer-implemented method for communicating message data from a sender computer to a receiver computer via a network, the method comprising
at the sender computer: - encrypting the message data in dependence on a cryptographic key to produce a ciphertext;
establishing an access password for the ciphertext with a host computer connected to the network;
sending the ciphertext via the network to the host computer; and
sending an email, containing said cryptographic key in cleartext, to the receiver computer via the network;
wherein the cryptographic key comprises a random cryptographic value which is independent of the access password,at the host computer, receiving the ciphertext from the sender computer and storing the ciphertext in association with the access password, at the receiver computer, receiving said email from the sender computer and sending an access request for the ciphertext, and an input password, to the host computer via the network, at the host computer, receiving said access request and the input password from the receiver computer and sending the ciphertext to the receiver computer via the network if the input password equals the access password, and at the receiver computer, receiving the ciphertext from the host computer and decrypting the ciphertext using said cryptographic key to obtain said message data. - View Dependent Claims (19, 20, 21, 22, 23)
- encrypting the message data in dependence on a cryptographic key to produce a ciphertext;
Specification